Chaos and Fractal-Based Information Hiding Techniques as Applied to Steganography

被引:0
作者
Ntaoulas, Nikolaos [1 ]
Drakopoulos, Vasileios [1 ]
机构
[1] Univ Thessaly, Dept Comp Sci & Biomed Informat, Lamia, Greece
来源
PERSPECTIVES IN DYNAMICAL SYSTEMS II-NUMERICAL AND ANALYTICAL APPROACHES, DSTA 2021 | 2024年 / 454卷
关键词
Fractals; Steganography; Chaos; Information hiding; ALGORITHM;
D O I
10.1007/978-3-031-56496-3_25
中图分类号
O29 [应用数学];
学科分类号
070104 ;
摘要
Exploiting chaos and fractals is a field of great interest and has attracted a lot of attention in the last decades as far as steganography and cryptography are concerned. Their dynamic and sensitive properties lead to numerous applications; thus, research is gradually increasing through the years. The exploration of the field and the proposed applications found in bibliography, through an effort to classify directions and techniques, is the main purpose of this work. The wide spread of networking and vast amount of data circulating everyday through internet reveal both opportunities and dangers as far as security is concerned. The opportunity arising for steganography is obvious allowing to select different channels to transmit information hidden in various multimedia files. The most frequently used files are images, as transmission is daily thriving, while efficiently provide the properties required for hiding information. The main goals in steganography are explored, that is robustness, tamper resistance, hiding capacity and perceptual transparency, presenting the role fractals and chaos theory play.
引用
收藏
页码:387 / 401
页数:15
相关论文
共 50 条
  • [31] Quantifying the impact of adversarial attacks on information hiding security with steganography
    Mohammad Ubaidullah Bokhari
    Basil Gulfam
    undefined Hanafi
    [J]. International Journal of Information Technology, 2025, 17 (1) : 409 - 422
  • [32] Image encryption algorithm based on reversible information hiding and physical chaos in images
    Liu, Pengcheng
    [J]. RESULTS IN PHYSICS, 2023, 54
  • [33] Using steganography techniques for implicit authentication to enhance sensitive data hiding
    Kadhum, Rafal Najeh
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2022, 13 (01): : 3973 - 3983
  • [34] Adaptive LSB Steganography Based on Chaos Theory and Random Distortion
    Tutuncu, Kemal
    Demirci, Baris
    [J]. ADVANCES IN ELECTRICAL AND COMPUTER ENGINEERING, 2018, 18 (03) : 15 - 22
  • [35] Image steganography Based on Chaos Permutation, Authentication and Wiener Deconvolution
    Sheidaee, Ali
    Asadpour, Mohammad
    Farzinvash, Leili
    [J]. 2021 29TH IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2021, : 573 - 578
  • [36] A fractal-based image processing language: formal modeling
    Bourbakis, NG
    Alexopoulos, C
    [J]. PATTERN RECOGNITION, 1999, 32 (02) : 317 - 338
  • [37] An improved hiding information by modifying selected DWT coefficients in video steganography
    Ferda Ernawan
    [J]. Multimedia Tools and Applications, 2024, 83 : 34629 - 34645
  • [38] Information Hiding through Dynamic Text Steganography and Cryptography Computing and Informatics
    Bhat, Deepali
    Krithi, V
    Manjunath, K. N.
    Prabhu, Srikanth
    Renuka, A.
    [J]. 2017 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2017, : 1826 - 1831
  • [39] Optimal quantization-based steganography for adaptive hiding
    Liu, Guangjie
    Dai, Yuewei
    Wang, Zhiquan
    Yang, Jingyu
    [J]. 2008 THIRD INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA, VOLS 1-3, 2008, : 1246 - +
  • [40] Data hiding technique in steganography for information security using number theory
    Rehman, Amjad
    Saba, Tanzila
    Mahmood, Toqeer
    Mehmood, Zahid
    Shah, Mohsin
    Anjum, Adeel
    [J]. JOURNAL OF INFORMATION SCIENCE, 2019, 45 (06) : 767 - 778